D = Distinguished; P = Prize; R = Research publication.
- 2025 - MEng Computing: Rickie Ma, D:P:R
Enhancing robustness of a Generative Host-Based Intrusion Detection System
- 2025 - MEng Computing: Lucy Steele, R
Towards Fair and Reproducible Evaluation of Deep Learning-Based Security Solutions
- 2024 - MSc Computing: Euan Goodbrand, D:P:R
Learning From Noisy Network Intrusion Detection Systems Data
- 2024 - MSc Computing: Yannis Belkhiter, R
Does quantization kill alignment?
- 2024 - MSc Computing: Panagiotis Christodoulou, R
OOD Prefix Prompt Attack: Hiding Secrets in LLMs
- 2023 - MEng Computing: Luqman Liaquat, D:P
Automated Diagnostics of Vulnerabilities in Browser-Based Security Mechanisms
- 2023 - MSc Computing: Congyun Guo, D
Deep Natural Language Processing Model for Phishing Detection and Target Identification
- 2023 - MSc Computing: Janvi Thakkar, 2R
Towards Unified Defense: Adversarial Training, Watermarking, and Privacy Preservation
- 2022 - MSc Computing: Salim Al-Wahaibi, D:P:R
Reinforcement Learning For Web Security
- 2021 - MEng Computing: Alexander Nielsen, D
Creating a honeypot for detecting malicious web requests
- 2020 - MEng Computing: Rishi Rabheru, D:P:R
Discovering security vulnerabilities in source code using Machine Learning
- 2020 - BEng Computing: James Williams, D:P
Identification of IP addresses using fraudulent geolocation data [YouTube]
- 2019 - MSc Computing: Olivier Roques, D:P
Detecting Malware in TLS Traffic
- 2019 - MEng Computing: Thomas Bower, D:P
Identifying JavaScript skimmers on high-value websites
- 2018 - MEng Compting: Thomas Szyszko, D
Phishing Website Classification through Behavioural Analysis
- 2018 - MEng Computing: Hongtao Li, D
AMJ - An Analyzer for Malicious JavaScript
- 2017 - MSc Computing: Yuen Choo, D
Cross-Device Tracking of Employees with Social Networks
- 2016 - MSc Computing: Dimos Raptis, D
Monitorito: Real-time visualisation of high-dimensional web traffic
- 2015 - BEng Computing: Sher Ali Khan, D
A Comparative Study of PHP Dialects
- 2015 - MEng EEE: Lin Xin Koh, D:P
Stealthy host monitoring capabilities in a Honeypot
- 2014 - BEng Computing: Charlie Hothersall-Thomas, D:P:R
BrowserAudit, A web application that tests the security of browser implementations